Sciweavers

3011 search results - page 299 / 603
» Generating XML Based Specifications of Information Systems
Sort
View
103
Voted
DSN
2005
IEEE
15 years 9 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
139
Voted
JFP
2000
163views more  JFP 2000»
15 years 3 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
118
Voted
ICANN
2007
Springer
15 years 9 months ago
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
Abstract. Keyword spotting is a detection task consisting in discovering the presence of specific spoken words in unconstrained speech. The majority of keyword spotting systems ar...
Santiago Fernández, Alex Graves, Jürge...
PERCOM
2005
ACM
16 years 3 months ago
Hybrid Context Model Based on Multilevel Situation Theory and Ontology for Contact Centers
Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relation...
Anupama Kalyan, Srividya Gopalan, V. Sridhar
ICNP
2005
IEEE
15 years 9 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu